(Updated April 2009)
Information technology and resources include, but are not limited to: computers, software, databases, files, computer accounts, networks, Internet access, and electronic communication. The following are guidelines for acceptable use of information technology at Doane College.
The use of information technology and resources is a privilege extended to Doane College students, faculty, and staff. That use is restricted to academic, educational, research, and/or administrative purposes. These resources may not be used for commercial or business income purposes unless specific, written authorization for such use is given by the college. Any reselling of Doane’s network services is prohibited.
All use of information technology and resources must comply with federal, state and local laws, licensing and purchasing agreements, and Doane policies. Users of outside facilities such as libraries, Internet, or other electronic communication facilities must also comply with the acceptable practices and restrictions established by those facilities.
Individuals may not use institutional resources without proper authorization from the assigned user of the resource. Individuals may not use another user’s computer account or user I.D. or change another user’s password without prior permission from the assigned user. Users are responsible for their use of computer hardware, software, accounts, user I.D.s and passwords. Users are responsible for all resources assigned to them even if another person uses them.
Users must not access, copy, view or change private files without authorization. They may not change, create, or delete public files or directories without proper authorization. Users do not have the right to create or receive unauthorized copies of software. Users must not attempt to modify software, data, or systems in an unauthorized manner.
Information technology and resources must not be used to make unauthorized entry into other communications, computational, or informational devices or resources. Accessing restricted databases requires authorization.
ABUSE/MISUSE OF RESOURCES
Users must not misuse or abuse any information resources. Information technology and resources must not be used to disrupt or interfere with other users, services, or equipment. This includes, but is not limited to:
- Threatening or harassing others. This includes electronically transmitting or reproducing materials that are slanderous or defamatory in nature or that otherwise violate existing laws or Doane College regulations.
- Propagating viruses or worms.
- Posting or mailing of obscene materials.
- Displaying obscene, lewd, or sexually harassing images or text on a computer owned by Doane College or in a location that may be easily viewed by others.
- Distributing unsolicited advertising, initiating or propagating electronic chain letters, inappropriate mass mailing, including multiple mailings to newsgroups, mailing lists, or individuals, e.g. “spamming” flooding,” or “bombing,” or random mailing of messages.
- Originating e-mail in such a manner as to create the impression to the recipient that the mail was originated from another source or individual. All materials sent via the campus network must be attributed to the individual, office or organization sending the material.
- Using the campus network to gain unauthorized access to any computer systems (including other student-owned computers).
- Connecting unauthorized equipment to the campus network (this includes personal hubs, switches, routers, wireless access points, servers, and any other devices that may have a negative effect on network performance).
- Attempting to circumvent data protection schemes or uncover security loopholes. This includes creating and/or running programs that are designed to identify security loopholes and/or decrypt intentionally secure data.
- Associating an unapproved domain name with a Doane College-owned IP address.
- Knowingly or carelessly performing an act that will interfere with the normal operation of computers, terminals, peripherals, or networks (this includes downloading excessive amounts or transferring excessive amounts across the network).
- Deliberately wasting/overloading computing resources, such as printing too many copies of a document or using excessive bandwidth on the network. Individuals who use excessive amounts of bandwidth will be notified and given an opportunity to adjust their usage. If the individual does not voluntarily comply, access for that individual will be electronically restricted.
- Using Doane College resources for commercial activity such as creating products or services for sale.
- Forging or disguising the identity of a user or machine in an electronic communication.
- Attempting to monitor or tamper with other user’s electronic accounts; communications; or reading, copying, changing, or deleting another user’s files or software without the explicit agreement of the owner.
- Violating copyright laws and their fair use provisions through inappropriate reproduction, downloading, and/or distribution of music (including MP3 files), movies, computer software, copyrighted text, images, etc. Note: all Doane network users are expected to comply with the copyright laws of the United States, regardless of the location of the server from which they are downloading.
Violations of the Doane College acceptable use policy are subject to action by the college. Violations will be referred to the Vice President for Information Technology, who will report issues and problems for review by the appropriate Administrator or the Dean of Student Leadership and the Academic Dean, and will be referred to the appropriate administrative or judicial proceedings. Violators may be billed or fined for unethical or illegal use of information technology. They may also be subject to dismissal, suspension, loss of network and computing privileges, and/or legally prosecuted.
The software used by the institution is protected under federal Copyright Law. All students, staff, and faculty must comply with these regulations. It is illegal to make personal copies of software unless specifically allowed by a license agreement. Questions regarding specific instances should be directed to a professional staff member of the Office of Technology.
Students found in possession of illegal copies of software (either copies they have made or acquired by other means, or copies of software designated for use in class sessions or through the library that have not been issued to a student) will be subject to disciplinary action.
SOFTWARE AND HARDWARE MAINTENANCE
Students must share the responsibility for keeping software and equipment in good repair. If a student encounters a problem with a piece of software or equipment, the student should report this to a computer lab aide, a professional staff member of the Office of Technology, or a member of the library staff.
Doane College students may purchase Microsoft Office Professional in the Doane College Bookstore. This software is made available through a licensing agreement between the college and Microsoft. Therefore, only Doane College students (not other college students) are eligible to purchase this software from the Doane Bookstore. Students who purchase this software are required to abide by the Microsoft End User Licensing Agreement that is included when the software is purchased.
All users are expected to abide by the end user licensing agreements for all other software that is either purchased through the Doane College Bookstore or installed on Doane College computers.
COMPUTER LAB POLICIES
Students should not save their documents to the hard drives on the lab computers; network file space is made available to all students, faculty and staff for this purpose. Documents and miscellaneous files are periodically removed from the computer lab hard drives and the user could lose his or her data. Users of the computer labs are expected to pick up any extraneous paper and waste that result from their printing and place any computer paper in the receptacles provided for recycling. Excessive printing in the labs is not allowed. If you mistakenly submit a print job that is extremely large, you should notify the network administrator or lab aid on duty to cancel the print job as soon as possible. No equipment supplies, software, or manuals may be removed from computing sites without proper authorization.
All food, drink, and tobacco products are strictly prohibited from entering the computer labs. Students who do not comply with this regulation run the risk of exclusion from the labs for the remainder of the semester in which the violation occurred.
Laptop computers are available in the library. Students may check out a laptop for a period of two days. Failure to return the laptop within one hour of the time it is due results in loss of privileges to check out laptops for the remainder of the semester. From the time the laptop is checked out to the time it is returned, the person who has checked out the laptop assumes full responsibility for the care of the equipment and will return it in full working order or be charged for necessary repairs due to damages incurred. While checking out a laptop, the user assumes full responsibility even if someone else is using it. If a user fails to return a laptop, the user will be charged replacement cost and processing fees for the hardware and software.
CONNECTING A COMPUTER TO THE NETWORK
Student computers attempting to connect to the campus network will be scanned prior to allowing a connection. The scan will determine if current operating patches have been installed, along with other security requirements. If a computer fails the scan, it will not be allowed on the network until necessary software has been installed. All computers connected to the Doane network are required to comply with the following:
- Install and run an approved antivirus software as recommended by the college to all Doane students at no charge.
- Install all current operating system patches and maintain current patches
- Run a spyware removal tool on a regular basis. Freeware tools are provided to all students through the campus network.
- The computer must have an IP address and MAC address that is visible. Using tools to hide or disguise your computer name, IP address and/or MAC address is strictly prohibited.
- Use of personal routers is not allowed. Many multi-port switches have built-in routers and they will not work on our network. If you need to connect more than 2 computers in a room, you may checkout a 4-port switch from the Business Office on campus.
- Personal wireless access points are not allowed and will not work on our network. This includes switches, routers, and setting up your computer as an access point.
Computers acting as servers or running server services are not allowed except where approved by the Office of Technology.
PRIVACY EXPECTATIONS AND EXCEPTIONS
Doane College reserves the right to monitor electronic activity of users when there is activity that appears to be harmful to another user, to the campus systems and/or network (programs being launched to attack the servers, users attempting to break into accounts, etc.), or when there is evidence of violations of the appropriate use policy.
When there is no evidence of an appropriate use violation or threat to the Doane College system or network, computer users have the right to expect that their materials remain private. No person, regardless of status (i.e., including the system manager, faculty member or college administrator) may view, change or remove another user’s files without the user’s permission, whether the material exists on network media or on a user’s own media. An exception exists for class accounts which are owned and managed by an instructor or system manager and which exist strictly for a class project and which exclude personal electronic mail. In these cases, the administrator of the account is allowed complete access, but persons outside of the class are not. Documents stored on public use computers (labs) have no expectation for privacy and documents may be deleted at any time.
Files which reside in a user’s account on a network drive or on a user’s personal computer are to be considered private except where a runaway program that could be either accidental or an intentional hack, or a virus is in the process of causing damage or is inhibiting the work of others. In this case, it may be necessary for a system manager to inspect the file that is suspected of causing the problem.